-
Cultivation Strategy of Western Classical Aesthetics in Senior Vocal Music Teaching
Issue:
Volume 11, Issue 3, June 2023
Pages:
87-92
Received:
21 March 2023
Accepted:
17 May 2023
Published:
18 May 2023
Abstract: In order to cultivate students' mastery of the basic skills of professional vocal music and enhance their musical literacy through professional aesthetics, the classical aesthetics of the Western Renaissance period are introduced into the teaching of vocal music in normal universities. Dig deeply into the unique music style of this period, with smooth and beautiful song melody, the overall span of the range is not obvious, showing elegant and simple feelings, with a strong spirit of humanism. On the basis of summarizing the style characteristics of Western classical art songs, this paper explores how to reasonably apply Western classical art songs in vocal music teaching in normal universities, analyzes the role of Western classical art songs in vocal and aesthetic teaching in normal universities, and believes that vocal music songs have a limited range and are suitable for singing. Music literacy can be improved by enriching genres, and students can pay attention to musical emoticons by singing softly and slowly, feel the changes brought by different symbols to music. Choose a suitable singing art style, and the singer has their own artistic understanding and aesthetic ability when performing. To have artistic aesthetic ability, one must have an understanding of music history and culture. And an empirical study was conducted using the song "Amaryly" in vocal teaching in normal universities as an example, hoping to cultivate more excellent and comprehensive vocal teaching staff for the vocal teaching career.
Abstract: In order to cultivate students' mastery of the basic skills of professional vocal music and enhance their musical literacy through professional aesthetics, the classical aesthetics of the Western Renaissance period are introduced into the teaching of vocal music in normal universities. Dig deeply into the unique music style of this period, with smo...
Show More
-
The Online Teaching Practice of the Tunnel Engineering During the COVID-19 Pandemic
Issue:
Volume 11, Issue 3, June 2023
Pages:
93-103
Received:
6 May 2023
Accepted:
23 May 2023
Published:
29 May 2023
Abstract: To cope with the constraint of the COVID-19 pandemic, online teaching is widely used in education. However, the adaptation from conventional face-to-face dominated classroom teaching to that of online mode is generally in a swift way. Considering the significant features of the online learning and teaching situation, both instructors and students would be confront with various challenges. Here is the presentation of the online teaching practice of the Tunnel Engineering during the COVID-19 pandemic. The practice indicates that the major challenges of the instructors are to perform the multiple roles of content expertise and presenter, student work assessor, online teaching procedure facilitator and manager. The students are confronted with the requirements of competence in terms of learner, presenter and respondent. The course design and implementation plan are initially tuned at the beginning of the online teaching to adapt to the new situation. With a new teaching strategy being set up, the online teaching activities have been progressively tailored in corresponding to the feedback from students, peer reviews, the results of formative and summative assessments on the learning and teaching activities. The experience and lesson learned from the Tunnel Engineering online teaching for six classes from the three academic years 2020 to 2022 are presented in terms of course design and implementation plan, assessments, effective interaction and online teaching community.
Abstract: To cope with the constraint of the COVID-19 pandemic, online teaching is widely used in education. However, the adaptation from conventional face-to-face dominated classroom teaching to that of online mode is generally in a swift way. Considering the significant features of the online learning and teaching situation, both instructors and students w...
Show More
-
Strategies for Enhancing the Effectiveness of Elementary Science Classroom Teaching Based on Key Competencies
Issue:
Volume 11, Issue 3, June 2023
Pages:
104-109
Received:
20 March 2023
Accepted:
8 June 2023
Published:
14 June 2023
Abstract: With the continuous development of quality education and the increasingly fierce competition for talents among countries, the cultivation of students' science and technology levels and key competencies serves as a daunting task for elementary and secondary school teachers. The current educational policy emphasizes that elementary teachers should pay due attention to the development of elementary students' key competencies, and improving the effectiveness of science classroom teaching is particularly significant. By elaborating on the concept of “key competencies” and by presenting the features of effective classroom teaching, this study reveals the profound and unique connotations of key competencies in the context of China's national conditions and the characteristics of the times. And this study points out some basic directions for the construction of elementary science classroom teaching as well. In addition, with the purpose of enhancing students' science and technology levels and cultivating their key competencies, this study proposes seven strategies that can effectively facilitate primary science classroom teaching, such as integrating multimedia tools to improve the effectiveness of science classroom teaching, highlighting the position of students and creating a good learning situation, and improving teachers' scientific competence and teaching abilities through multi-faceted learning and training, This study has a strong practical significance for pre-service and post-service elementary science teachers to design and implement more effective science classroom teaching.
Abstract: With the continuous development of quality education and the increasingly fierce competition for talents among countries, the cultivation of students' science and technology levels and key competencies serves as a daunting task for elementary and secondary school teachers. The current educational policy emphasizes that elementary teachers should pa...
Show More
-
Authentication Based on Attribute Encryption with Machine Learning
Weiran Tang,
Ga Xiang,
Yawei Ren
Issue:
Volume 11, Issue 3, June 2023
Pages:
110-116
Received:
12 May 2023
Accepted:
8 June 2023
Published:
14 June 2023
Abstract: In recent years, even under the access control based on attribute encryption, the information resources in the network will inevitably be illegally obtained. There will still be the phenomenon of attackers posing as legitimate users to pass identity authentication. Therefore, it is necessary to take measures for behavior detection before identity authentication to establish trust between users and the network. After preprocessing the data set of user behavior information, the machine learning model is built to predict whether the user behavior is abnormal or not. Logical regression model, KNN model, and decision tree model are mainly built. After analyzing the prediction results, authentication is required. Therefore, an algorithm based on CP-ABE is proposed. First of all, establish a ciphertext access structure. Secondly, extract the user's valid identity element. Finally, verify the identity and decrypt. From the experimental results, the accuracy of the above three machine learning models is more than 75%. But the f1-score of the decision tree model is up to 93%, which is the highest, indicating that the decision tree model is largely suitable for dealing with the problem of behavior detection. In addition, the CP-ABE algorithm can determine whether the user has the right to access the information according to the user's identity effectively and quickly. The solution prevents and controls users with abnormal behavior and failed identity information verification effectively. It combines machine learning algorithm and algorithm based on attribute encryption successfully and makes certain contributions to the research of problems in this field.
Abstract: In recent years, even under the access control based on attribute encryption, the information resources in the network will inevitably be illegally obtained. There will still be the phenomenon of attackers posing as legitimate users to pass identity authentication. Therefore, it is necessary to take measures for behavior detection before identity a...
Show More